Skip to content

Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords

Notifications You must be signed in to change notification settings

ins1gn1a/Hexcat

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

Hexcat

Decode Hashcat '$HEX[]' password output following an epic cracking session.

Usage

./hexcat.py <INPUTFILE>

Input File Example

username1:Passw0rd
username2:L3tme!n
username3:3X4mpl£!
username4:$HEX[74657374696e67]

About

Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages